heroui logo

BPF Program or Map Load via bpftool

Elastic Detection Rules

View Source
Summary
This detection rule, authored by Elastic, identifies the execution of `bpftool` commands that manage eBPF (Extended Berkeley Packet Filter) programs and maps. The primary focus is on loading, attaching, running, pinning of eBPF programs, and operations such as creating or updating eBPF maps and links. These operations are critical as they interact with the Linux kernel and can modify its behavior. While legitimate uses of `bpftool` exist—primarily in networking and observability tools—unexpected or unauthorized use may signify malicious actions such as the deployment of eBPF-based rootkits, policy tampering, or unauthorized manipulations of kernel instrumentation. The rule outputs events where `bpftool` is invoked with specific arguments related to these operations, allowing analysts to investigate potential threats in the Linux environment effectively.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
  • Application Log
  • Container
  • User Account
ATT&CK Techniques
  • T1547
  • T1547.006
  • T1014
Created: 2026-02-20